Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.50740
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2003:082 (php)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to php
announced via advisory MDKSA-2003:082.

A vulnerability was discovered in the transparent session ID support
in PHP4 prior to version 4.3.2. It did not properly escape user-
supplied input prior to inserting it in the generated web page. This
could be exploited by an attacker to execute embedded scripts within
the context of the generated HTML (CVE-2003-0442).

As well, two vulnerabilities had not been patched in the PHP packages
included with Mandrake Linux 8.2: The mail() function did not filter
ASCII control filters from its arguments, which could allow an attacker
to modify the mail message content (CVE-2002-0986). Another
vulnerability in the mail() function would allow a remote attacker to
bypass safe mode restrictions and modify the command line arguments
passed to the MTA in the fifth argument (CVE-2002-0985).

All users are encouraged to upgrade to these patched packages.

Affected versions: 8.2, 9.0, 9.1, Corporate Server 2.1,
Multi Network Firewall 8.2


Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2003:082
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0442
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0985
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0986

Risk factor : High

CVSS Score:
7.5

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2003-0442
BugTraq ID: 7761
http://www.securityfocus.com/bid/7761
Bugtraq: 20030530 PHP Trans SID XSS (Was: New php release with security fixes) (Google Search)
http://marc.info/?l=bugtraq&m=105449314612963&w=2
Bugtraq: 20030707 [OpenPKG-SA-2003.032] OpenPKG Security Advisory (php) (Google Search)
http://marc.info/?l=bugtraq&m=105760591228031&w=2
Computer Incident Advisory Center Bulletin: N-112
http://www.ciac.org/ciac/bulletins/n-112.shtml
Conectiva Linux advisory: CLSA-2003:691
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000691
Debian Security Information: DSA-351 (Google Search)
http://www.debian.org/security/2003/dsa-351
http://www.mandriva.com/security/advisories?name=MDKSA-2003:082
http://shh.thathost.com/secadv/2003-05-11-php.txt
http://www.osvdb.org/4758
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A485
http://www.redhat.com/support/errata/RHSA-2003-204.html
SCO Security Bulletin: CSSA-2003-SCO.28
http://www.securitytracker.com/id?1008653
TurboLinux Advisory: TLSA-2003-47
http://www.turbolinux.co.jp/security/2003/TLSA-2003-47j.txt
XForce ISS Database: php-session-id-xss(12259)
https://exchange.xforce.ibmcloud.com/vulnerabilities/12259
Common Vulnerability Exposure (CVE) ID: CVE-2002-0986
BugTraq ID: 5562
http://www.securityfocus.com/bid/5562
Bugtraq: 20020823 PHP: Bypass safe_mode and inject ASCII control chars with mail() (Google Search)
http://marc.info/?l=bugtraq&m=103011916928204&w=2
Caldera Security Advisory: CSSA-2003-008.0
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-008.0.txt
CERT/CC vulnerability note: VU#410609
http://www.kb.cert.org/vuls/id/410609
Conectiva Linux advisory: CLA-2002:545
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000545
Debian Security Information: DSA-168 (Google Search)
http://www.debian.org/security/2002/dsa-168
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:082
http://www.osvdb.org/2160
http://www.redhat.com/support/errata/RHSA-2002-213.html
http://www.redhat.com/support/errata/RHSA-2002-214.html
http://www.redhat.com/support/errata/RHSA-2002-243.html
http://www.redhat.com/support/errata/RHSA-2002-244.html
http://www.redhat.com/support/errata/RHSA-2002-248.html
http://www.redhat.com/support/errata/RHSA-2003-159.html
SuSE Security Announcement: SuSE-SA:2002:036 (Google Search)
http://www.novell.com/linux/security/advisories/2002_036_modphp4.html
XForce ISS Database: php-mail-ascii-injection(9959)
https://exchange.xforce.ibmcloud.com/vulnerabilities/9959
Common Vulnerability Exposure (CVE) ID: CVE-2002-0985
http://www.osvdb.org/2111
XForce ISS Database: php-mail-safemode-bypass(9966)
https://exchange.xforce.ibmcloud.com/vulnerabilities/9966
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.